2-4 - Storage - System - Architecture - Copie
2-4 - Storage - System - Architecture - Copie
Foreword
With the development of cloud computing and big data, the storage
architecture changes from scattered to centralized, and gradually evolves
to network-based, virtualized, and massive cloud storage. Storage not only
needs to provide routine services such as data management, data
replication, snapshot, mirroring, and migration, but also needs to enable
functions such as data disaster recovery, data consistency, virtualized
convergence, elastic computing, and resource expansion. These services and
functions depend on a good storage system architecture.
2 Huawei Confidential
Objectives
3 Huawei Confidential
Contents
4 Huawei Confidential
Storage System Architecture Evolution
5 Huawei Confidential
Single-controller Storage
SCSI interface
Logical disks are presented to hosts as LUNs.
SCSI
Terminator
controller
Controller
OS
6 Huawei Confidential
Dual-controller Storage
Services are running on Services are running on
only one controller. both controllers.
Active-Standby Active-Active
7 Huawei Confidential
Mid-range Storage Architecture Evolution
Fixed storage Dual-controller Flexible hardware Flexible software
system active-active component function
configuration redundancy configuration configuration
configuration
Limited Fibre Channel The single-controller Fast Ethernet (FE) Unified storage that
interfaces are and dual-controller interface module are supports both SAN
provided, and the active-passive supported, greatly and NAS protocols has
flexibility is poor. architecture gradually improving flexibility become a hotspot.
Capacity expansion evolve to the active- and scalability. Users can flexibly
can be implemented active architecture. The number of ports configure multi-
only by cascading disk can be selected as protocol services as
enclosures. required. required.
8 Huawei Confidential
Multi-controller Storage
Disk Disk
enclosures enclosures
9 Huawei Confidential
Mission-Critical Storage Architecture Evolution
Bus Hi-Star Direct-connection Virtual matrix
architecture architecture architecture architecture
10 Huawei Confidential
Storage Software Technology Evolution
Improved data Simplified data Improved space Optimized service
reliability management utilization performance
11 Huawei Confidential
Distributed Storage Technology Evolution
Automatic metadata extension
Giga+ indexing
Hadoop FS
Universal hardware Universal hardware Metadata separation Public cloud storage
Customized hardware Software-defined Software-defined Metadata extension
Scale-up Scale-up Scale-out EC Coding
Integrated Parallel cluster file Huawei
GoogleFS Azure Storage
box system OceanStor 100D
General purpose Scientific computing Analysis scenario Facebook
Facebook F4
Haystack
Social scenario Warm storage
MooseFS NoSQL
Small files
12 Huawei Confidential
Distributed Storage Architecture
iSCSI S3/Swift client
VBS
initiator HDFS client
Compute node Compute node
CM CM CM
Server node Server node Server node Server node Server node Server node Server node Server node Server node
Note: Huawei OceanStor 100D is used as an example to describe the distributed storage architecture.
13 Huawei Confidential
Contents
14 Huawei Confidential
Scale-up and Scale-out
With the continued development of enterprise information systems and the ever-increasing expansion in the
scale of services, service data keeps increasing. The initial configuration of storage systems is often not
enough to meet these demands. Storage system capacity expansion has become the major concern of system
administrators. There are two capacity expansion methods: scale-up and scale-out. The following uses Huawei
storage products as an example to describe the two methods.
Storage
Devices (enclosures and disks) Storage controllers
controllers
Storage Storage
controllers controllers
Scale-up architecture
Scale-out architecture
15 Huawei Confidential
SAS Disk Enclosure Scale-up Networking Principles
Adding a 2 U SAS disk enclosure to
an existing loop
Controller
enclosure
2 U SAS disk
enclosure 0
2 U SAS disk
enclosure 1
16 Huawei Confidential
Smart Disk Enclosure Scale-up Networking Principles
Adding a 2 U smart disk enclosure
to an existing loop
Controller
enclosure
Smart disk
enclosure 0
Smart disk
enclosure 1
17 Huawei Confidential
PCIe Scale-out and IP Scale-out
PCIe scale-out runs on the PCIe protocol while IP scale-out works based on the IP protocol.
Mid-range storage
Medium Functions and prices
enterprises balanced
IP scale-out
Entry-level storage
Small enterprises Price first
IP scale-out
18 Huawei Confidential
Scale-out Technologies Used by Huawei Storage Systems
OceanStor OS
XNET
iWARP
UDP
IB
PCIE DRV transport TCP
IP
PCIe IB ETH
19 Huawei Confidential
Scale-out Networking
Connects to the user's management network
Controller enclosure
0 (original)
Controller enclosure
1 (new)
20 Huawei Confidential
Local Write Process
1 2
SAN
1
LUN 2 PCIe switched network
4
21 Huawei Confidential
Non-local Write Process
1 4
SAN
1 4
LUN
2 PCIe switched network
3
6
22 Huawei Confidential
Local Read Process
1 2
SAN
8
Engine 0 Engine 1 Engine 2 Engine 3
3 4 6 7
23 Huawei Confidential
Non-local Read Process
1 4
SAN
1 4
10
Engine 0 Engine 1 Engine 2 Engine 3
5 6 8 9
24 Huawei Confidential
Contents
25 Huawei Confidential
Hardware Architecture with Two Controllers
Interface .. Interface Interface Interface
.. Service subsystem
module A0 . module A7 module B7 module B0
.
PCIe 3.0 x8 PCIe 3.0 x8
Management
Management Management subsystem
interface module A interface module B
12 V
12 V
Power Power Electromechanical
BBU 0 BBU 1 BBU 2 BBU 3
supply 0 supply 1 subsystem
Service channel
Manage channel
Power supply
26 Huawei Confidential
Hardware Architecture with Multiple Controllers
Interface ... Interface Interface ... Interface
module A0 module A5 module B5 module B0
PCIe 3.0 x8 PCIe 3.0 x8
... ...
Interface Interface Interface Interface
module A0 module A5 module B5 module B0
PCIe 3.0 x8 PCIe 3.0 x8
Management
Management Management
subsystem
interface module A interface module B
12 V
12 V
Electromechanical
Power Power Power Power
BBU 0 BBU 1 BBU 2 BBU 3 subsystem
supply 0 supply 1 supply 2 supply 3
27 Huawei Confidential
Full-mesh Architecture
Host I/O
Network adapter Network adapter
Fully-shared FIMs
Each front-end interconnect I/O module (FIM)
connects to all four controllers through PCIe ports
in a controller enclosure. This module can
FIM FIM FIM FIM simultaneously access the four controllers with
multi-channel technology in active-active mode.
28 Huawei Confidential
Fully Interconnected Disk Enclosures
Controller Controller
enclosure 0 enclosure 1
2 U smart disk
enclosure 0
2 U smart disk
enclosure 1
29 Huawei Confidential
E2E Global Resource Sharing
Host
SAN
Distributed based
on hash results DHT
Global cache
... ...
30 Huawei Confidential
Switchover in Seconds: Mission-Critical Storage with FIMs
Host
Hi1822
User mode
OS kernel mode
31 Huawei Confidential
Global Cache
Write latency
LUN 0 LUN 1 LUN 2 95 μs
4 KB 4 KB ... 8 KB 4 KB 4 KB ... 8 KB 4 KB 4 KB ... 8 KB
50 μs
write
RDMA
AddrN1 AddrN2 AddrN3
32 Huawei Confidential
Global Pool
A A1 A2 A3
B B1
LUN
C C1 C2
D D1 D2
LUN mapping
and FP mapping
Strip A B C D P Q
Strip A1 B1 C1 D1 P Q
Strip A2 A3 C2 D2 P Q
...
33 Huawei Confidential
Back-End Sharing
Engine 0 Engine 1 • A single port is connected via a single
13 0 13 connection in the external system.
• A single port is connected to four
A A controllers in the internal system.
0 13 0 13
B B
100 Gbit/s 100 Gbit/s • Dual physical links, balanced and
100 Gbit/s redundant
100 Gbit/s
A 0 1 2 3
B 0 1 2 3
A B C D
x4 x4 x4 • A single port on the controller
x4 cascades two disk enclosures in a
loop.
• A single expansion module supports
A 0 1 2 3
dual links, achieving load balancing
1822
B 0 1 2 3 and redundancy.
34 Huawei Confidential
Active-Active Architecture with Full Load Balancing
35 Huawei Confidential
Cache Mirroring Technology
The function is as follows:
Controller enclosure 1 Controller enclosure 2
36 Huawei Confidential
Key Reliability Technology
The function is as follows:
Controller A Controller B Controller C Controller D Controller A Controller B Controller C Controller D Controller A Controller B Controller C Controller D
37 Huawei Confidential
Host Service Switchover upon Failure of a Single
Controller
Host Host
Automatic
switchover
Backplane Backplane
38 Huawei Confidential
Quiz
2. (Short Answer Question) What are the differences between scale-up and scale-
out?
39 Huawei Confidential
Summary
Storage Architecture
Evolution
Storage System
Scale-up and Scale-out
Storage System Expansion Methods
Architecture
40 Huawei Confidential
More Information
Enterprise Huawei
Technical Enterprise
Support App Service App
41 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
42 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.